Security


Foiling Hackers with NAC: First, Know What You Have

Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.

NAC Up Close: Policy Enforcement Options

In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network.

Simple Steps to IM Management

IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.

Cenzic Provides Risk Assessment of Risky Business

A new product provides enterprises with a risk assessment analysis that keeps everyone informed.

IBM Initiates Global Security Strategy

New IBM initiatives target hackers and insider threats in a single, complete security platform.

How Security Breaches Impact Your Brand

New study shows disconnect between executives' understanding and action

Could Printers Be Your Biggest Insider Threat?

If you’re only as secure as your weakest link, printers could be your biggest threat.



Audits Address Overlooked Legacy Security

Guarding against external threats is important, but don’t overlook legacy systems security.

Symantec Report Highlights Web Security Struggle

To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.

Real World Requirements for Unified Threat Management

Three key features IT should look for when shopping for a UTM solution.

Protecting Remote-Site Data

EdgeSecure makes it easier to protect data stored in remote locations.

Management Software Offers Slew of Security Perks

Protecting mission-critical data means looking at port and USB vulnerabilities.

The Cold, Hard Costs of Data Exposure

Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.

New “Security” Blanket for Developers

V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering

Microsoft Patches Three Flaws, Zero-Day Still Open

As expected, Microsoft released three patches last week to fix one critical Office vulnerability as well as two Windows flaws.

Flagship Product Analyzes Red-flagged Applications

When it comes to malware, one company says their product separates the wheat from the chaff, advising enterprises which files should and shouldn’t be on their systems.

Improving Security and Manageability without Increasing TCO

TCO matters in the embedded marketplace; hardware integration is the key.

SOA Drives Need for XML Security

XML security is where it’s at for adopters of service-oriented architectures

Insider Threat: Three Steps to Restoring User Accountability

How to protect your organization from the most prevalent insider threat: legitimate users with access to confidential information

Podcast: Preventing Application Attacks

After protecting an enterprise from common virus attacks, IT must now protect its online applications.